A crucial component of vehicular network security is to establish a secure wireless channel between any two vehicles. In this paper, we propose a scheme to allow two cars to extract a secret key from RSSI (Received Si...
详细信息
ISBN:
(纸本)9781467359443
A crucial component of vehicular network security is to establish a secure wireless channel between any two vehicles. In this paper, we propose a scheme to allow two cars to extract a secret key from RSSI (Received Signal Strength Indicator) values in such a way that nearby cars cannot obtain the same secret. Our solution can be executed in noisy, outdoor vehicular environments. We also propose an online parameter learning mechanism to adapt to different channel conditions. We conduct extensive real-world experiments to validate our solution.
With the increasing popularity of cloud computing technologies, more and more service composition processes are enacted and executed in could environment. Compared with the various and approximately infinite applicati...
详细信息
Radio frequency identification (RFID) tags are used in a lot of applications such as production line and inventory management. Sensors are also a widely adopted wireless technology. This large scale deployment of both...
详细信息
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d...
详细信息
Cross-domain text classification aims to automatically train a precise text classifier for a target domain by using labeled text data from a related source domain. To this end, the distribution gap between different d...
详细信息
Cloud computing will be a main informa- tion infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for c...
详细信息
Cloud computing will be a main informa- tion infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribu- tion, feature template creation, cloud data processing and secure data access control. Finally, we compare the pro- posed scheme with other schemes through comprehensive analysis and simulation. The results show that the pro- posed data access scheme is feasible and secure for cloud computing.
Workflow management is concerned with automated support for business *** management systems are driven by process models specifying the tasks that need to be executed,the order in which they can be executed,which reso...
详细信息
Workflow management is concerned with automated support for business *** management systems are driven by process models specifying the tasks that need to be executed,the order in which they can be executed,which resources are authorised to perform which tasks,and data that is required for,and produced by,these *** workflow instances may run over a sustained period of time,it is important that workflow specifications be checked before they are *** verification is usually concerned with control-flow dependencies only;however,transition conditions based on data may further restrict possible choices between *** this paper we extend workflow nets where transitions have concrete conditions associated with them,called *** then demonstrate that we can determine which execution paths of a WTC-net that are possible according to the control-flow dependencies,are actually possible when considering the conditions based on ***,we are able to more accurately determine at design time whether a workflow net with transition conditions is sound.
Private health information once confined to local medical institutions is migrating onto the Internet as an Electronic Health Record (EHR) that is accessed by cloud computing. No matter where it is hosted, health data...
详细信息
Cloud Computing has emerged as a resource sharing platform, which allows different service providers to deliver software as services. However, for many security sensitive applications such as critical data processing ...
详细信息
To cope with time-constraint data query in an energy-efficient manner, mechanisms on joint optimization of expense and energy for mobile clients in wireless environments should be provided. We present an intelligent w...
详细信息
暂无评论